From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1014-1021. IEEE, (2015)How to solve collision and authentication issues using RFID protocol technology., , , , и . ICMLC, стр. 454-460. IEEE, (2011)DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks., , , , и . TAAI, стр. 158-163. IEEE Computer Society, (2013)Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network., , , и . ICACT, стр. 533-538. IEEE, (2019)The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting., , , и . ICMLC, стр. 2681-2686. IEEE, (2010)RePEF - A system for Restoring Packed Executable File for malware analysis., , , , , и . ICMLC, стр. 519-527. IEEE, (2011)Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking., , , и . ICITCS, стр. 1-7. IEEE Computer Society, (2015)Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis., , , и . AsiaJCIS, стр. 77-84. IEEE Computer Society, (2013)ChainSpot: Mining Service Logs for Cyber Security Threat Detection., , , , и . Trustcom/BigDataSE/ISPA, стр. 1867-1874. IEEE, (2016)Android privacy., , , , и . ICMLC, стр. 1830-1837. IEEE, (2012)